Sciweavers

5 search results - page 1 / 1
» Reinforcing Access Control Using Fuzzy Relation Equations
Sort
View
CSREASAM
2006
13 years 5 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
ISCA
2008
IEEE
137views Hardware» more  ISCA 2008»
13 years 11 months ago
Self-Optimizing Memory Controllers: A Reinforcement Learning Approach
Efficiently utilizing off-chip DRAM bandwidth is a critical issue in designing cost-effective, high-performance chip multiprocessors (CMPs). Conventional memory controllers deli...
Engin Ipek, Onur Mutlu, José F. Martí...
SP
2005
IEEE
104views Security Privacy» more  SP 2005»
13 years 10 months ago
On Safety in Discretionary Access Control
An apparently prevailing myth is that safety is undecidable in Discretionary Access Control (DAC); therefore, one needs to invent new DAC schemes in which safety analysis is decid...
Ninghui Li, Mahesh V. Tripunitara
SIMPRA
2010
110views more  SIMPRA 2010»
13 years 2 months ago
Singularity-free dynamic equations of vehicle-manipulator systems
In this paper we derive the singularity-free dynamic equations of vehiclemanipulator systems using a minimal representation. These systems are normally modeled using Euler angles,...
Pål Johan From, Vincent Duindam, Kristin Ytt...
ICRA
2000
IEEE
108views Robotics» more  ICRA 2000»
13 years 9 months ago
Controllability of Single Input Rolling Manipulation
This paper investigates controllability of underactuated rolling systems consisting of a smooth object rolling on a moving smooth surface. Our system consists of a spherical ball ...
Prasun Choudhury, Kevin M. Lynch